
Access Control Lists
3-75
3
Web
– Configure the mask to match the required rules in the IP ingress or egress
ACLs. Set the mask to check for any source or destination address, a specific host
address, or an address range. Include other criteria to search for in the rules, such
as a protocol type or one of the service types. Or use a bitmask to search for specific
protocol port(s) or TCP control code(s). Then click Add.
Figure 3-45 ACL Mask Configuration - IP
CLI
– This shows that the entries in the mask override the precedence in which the
rules are entered into the ACL. In the following example, packets with the source
address 10.1.1.1 are dropped because the “deny 10.1.1.1 255.255.255.255” rule
has the higher precedence according the “mask host any” entry.
Console(config)#access-list ip standard A2
4-89
Console(config-std-acl)#permit 10.1.1.0 255.255.255.0
4-90
Console(config-std-acl)#deny 10.1.1.1 255.255.255.255
Console(config-std-acl)#exit
Console(config)#access-list ip mask-precedence in
4-93
Console(config-ip-mask-acl)#mask host any
4-94
Console(config-ip-mask-acl)#mask 255.255.255.0 any
Console(config-ip-mask-acl)#
Summary of Contents for ES4612
Page 2: ......
Page 4: ...ES4612 F1 0 2 5 E092004 R01 150000046400A ...
Page 38: ...Introduction 1 10 1 ...
Page 48: ...Initial Configuration 2 10 2 ...
Page 269: ...IP Routing 3 221 3 Web Click Routing Protocol RIP Statistics Figure 3 130 RIP Statistics ...
Page 314: ...Configuring the Switch 3 266 3 ...
Page 644: ...Command Line Interface 4 330 4 ...
Page 658: ...Glossary Glossary 8 ...
Page 664: ...Index 6 Index ...
Page 665: ......
Page 666: ...ES4612 E092004 R01 150000046400A ...